Harden the device
Recommendations to optimize cybersecurity in a protected environment:
- Harden the meter according to your company’s policies and standards.
- Review assumptions about protected environments and address potential risks and mitigation strategies. See Product defense in depth for details.
- Change the default password. See Passwords for details.
- Change the communication protocol ports from their default values. This lowers the predictability of port use.
- Disable communication protocol ports when they are not in use. This reduces the attack surface.